top of page
Paper 1: Testimonial
Image by ThisisEngineering RAEng

1. Introduction to Data Science 

  • Define data science

  • Explain how visualising data can help identify patterns and trends in order to help us gain insights

  • Use an appropriate software tool to visualise data sets and look for patterns or trends

Topic 1 - Delving into data science

Image by Joshua Rawson-Harris

2. Understanding of the purpose of data science

  • Recognise examples of where large data sets are used in daily life

  • Select criteria and use data set to investigate predictions

  • Evaluate findings to support arguments for or against a prediction

Image by Jan Antonin Kolar

3. Problem, plan, data, analyse, conclusion

  • Define the terms ‘correlation’ and ‘outliers’ in relation to data trends

  • Identify the steps of the investigative cycle

  • Solve a problem by implementing steps of the investigative cycle on a data set

  • Use findings to support a recommendation

Topic 2 - Global Data

Topic 4 - Data for action

Image by Firmbee.com

4. Investigating a problem - investigative cycle

  • Identify the steps of the investigative cycle

  • Identify the data needed to answer a question defined by the learner

  • Create a data capture form

Topic 5 - Clean it up

Image by Luke Chesser

5. Investigative cycle

  • Describe the need for data cleansing

  • Apply data cleansing techniques to a data set

  • Visualise a data set

Topic 6 - Make a change 

Image by NEW DATA SERVICES

6. School litter project

  • Visualise a data set

  • Analyse visualisations to identify patterns, trends, and outliers

  • Draw conclusions and report findings

Unit 15 - Data Science 

This unit will take you on an eye-opening journey of discovery about techniques used by cybercriminals to steal data, disrupt systems, and infiltrate networks. You will start by considering the value of their data to organisations and what they might use it for. You will then look at social engineering techniques used by cybercriminals to try to trick users into giving away their personal data. The unit will look at the more common cybercrimes such as hacking, DDoS attacks, and malware, as well as looking at methods to protect ourselves and our networks against these attacks.

Assessment 

Image by Glenn Carstens-Peters

7. End of unit assessment 

Reflection

©2024 BY EDUCATION TOOLZ. 

  • Youtube
bottom of page